透過您的圖書館登入
IP:3.139.83.62
  • 學位論文

以類別索引表為基礎之彩色浮水印技術研究

A Study of CIT-based Color Image Watermarking Method

指導教授 : 陳建彰

摘要


浮水印技術為嵌入資訊於數位影像中之一種技術,再藉由資料抽取的步驟,取出原嵌入的資訊。而可逆浮水印技術(Reversible Image Watermarking)在抽取已嵌入的浮水印資訊後,可以同時獲得完整的原始影像。可逆浮水印技術對於著作權的保護,有很重要的保護功能。 至目前有眾多可逆浮水印的技術被提出。近年來,有學者提出類別索引表(Class Index Table, CIT)方法,藉由區塊內排列順序的調整,建立視覺上與掩護影像相似的浮水印嵌入後的圖。然而,直接使用類別索引表的浮水印嵌入後之視覺效果並不好,本論文研究使用彩色影像間之配對方式,透過影像區塊距離矩陣、貪婪式配對方式及類別索引表嵌入三大步驟,進行快速的計算處理,以期能獲得高效能及高品質之掩護影像。本論文比較多種類別索引表的方法,並期能獲得較佳的參數組合。

並列摘要


A reversible image watermarking scheme recovers the original image after extracting the embedded watermarks. A conventional CIT-based image watermarking method segments digital images to combination of non-overlapped blocks. Blocks of the original image is one-to-one mapped to blocks of the covered image for acquiring the watermarked image. The mapping table is needed for perfectly recovering the original image from the watermarked image. Quality of the watermarked image is determined by mapping procedure and the selection of mapping table. In this study, we examine different selection strategies to present an efficient method for acquiring good quality of the watermarked image. Analysis with other selected strategies, like random preprocessing or nearest matching, are compared. Moreover, color image has better watermarked image quality than gray-level image. For acquiring good watermarked image, nearest matching is the so-far best strategy on the CIT-based method. Experimental results show that the watermarked image has a similar visual effect to the target image but can perfect recover to the original image by using the mapping table.

參考文獻


[1] A. Jolfaei, X. W. Wu and V. Muthukkumarasamym, “On the security of permutation-only image encryption schemes,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 235–246, 2016.
[2] A. M. Alattar, “Reversible watermark using the difference expansion of a generalized integer transform,” IEEE Transactions on Image Processing, vol. 13, no. 8, pp. 1147–1156, 2004.
[3] B. Ou, X. L. Li, Y. Zhao, R. R. Ni and Y. Q. Shi, “Pairwise prediction-error expansion for efficient reversible data hiding,” IEEE Transactions on Image Processing, vol. 22, no. 12, pp. 5010–5021, 2013.
[4] C. C. Chen, Y. H. Tsai and H. C. Yeh, “Difference-expansion based reversible and visible image watermarking scheme,” Multimedia Tools Applications, vol.76, no. 6, 8497–8516, March, 2017.
[5] C. C. Chen and W. J. Wu, “A secure boolean-based multi-secret image sharing scheme,” Journal of Systems and Software, vol. 92, no. 1, pp. 107–114, 2014.

延伸閱讀